Institutional Repository

Browsing South African Computer Journal (SACJ) by Title

Browsing South African Computer Journal (SACJ) by Title

Sort by: Order: Results:

  • Bradshaw, J (South African Computer Society (SAICSIT), 1992)
    This paper serves as an introduction to the areas of qualitative reasoning. The three main streams of qualitative reasoning are described: the component centered approach, the process centered approach and the constraint ...
  • Gabbay, D; Ohlbach, HJ (South African Computer Society (SAICSIT), 1992)
    An algorithm is presented which eliminates second-order quantifiers over predicate variables in formulae of type 3Pi , ...,Pn 1/; where 1/J is an arbitrary formula of first-order predicate logic. The resulting formula is ...
  • Blackburn, P; Jaspars, J; De Rijke, M (South African Computer Society (SAICSIT), 1997)
    The purpose of these notes is two fold: (i) to give a reasonably self-contained introduction to a particular approach to theory change, known as the Alchourron-Gardenfors-Makinson (AGM) approach, and to discuss some of the ...
  • Vahed, A (South African Computer Society (SAICSIT), 1995)
    The associative network presents a practical and efficient means for the storage and retrieval of data. Although the recall abilities of single-layer associative memories have been well researched [3], little investigation ...
  • Turner, R; Lowry, G (South African Computer Society (SAICSIT), 1999)
    This paper is the first of a series of studies of a research program aimed at achieving a better fit between university study and professional practise of information systems. The paper reports the results of two surveys: ...
  • Renaud, K; Kotze, P (South African Computer Society (SAICSIT), 1997)
    In many applications today multiple pre-existing database systems are integrated into a single multiple database system called a multi­database system. One of the biggest problems for transaction management in a multidatabase ...
  • Tcheeko, L (South African Computer Society (SAICSIT), 1998)
    The pedagogical assessment of a tutoring system relies upon a proof of convergence: for such a tutor the correction of student mistakes must not forever delay the teaching process. Such a tutor must provide uniform diagnosis ...
  • Morgan, C (South African Computer Society (SAICSIT), 1995)
    The refinement calculus, based on weakest preconditions, elaborates imperative program developments as a series of steps linked by a mathematical refinement relation. Specifications and executable code are regarded equally ...
  • De Ru, WG; Eloff, JHP (South African Computer Society (SAICSIT), 1996)
    This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each ...
  • Hing, RL (South African Institute of Computer Scientists and Information Technologists, 1990)
    An old approach used in classification systems has been revived by the discovery of new algorithms which use this approach to approximate complex non-linear functions. This approach, known as neurocomputing, classifies ...
  • Fallick, PM; Pistorius, MC (South African Institute of Computer Scientists and Information Technologists, 1990)
    This informal review is based on personal discussions carried out within the last year with various experts in the field as to the current use of computers in primary and secondary schools. An attempt has been made to ...
  • Pistorius, MC; Fallick, PM (South African Institute of Computer Scientists and Information Technologists, 1990)
    This informal review is based on personal discussions carried out within the last year with various experts in the field on the current use of computers in tertiary education, particularly at universities. An attempt has ...
  • Froneman, L; Roode, JD (South African Computer Society (SAICSIT), 1996)
    Many curriculum designs are based purely on what educators think it should be, reflecting their own experiences or idiosyn­crasies, with little reference to the needs of the information systems field. A number of studies ...
  • Handzic, M; Low, G (South African Computer Society (SAICSIT), 1999)
    This paper reports the results of an empirical examination of the effects of experience in using a multifunctional information technology on users' perceptions of its usefulness and ease of use in a university task context ...
  • Machanick, P (South African Computer Society (SAICSIT), 2000)
    The RAMpage memory hierarchy is an alternative to the traditional division between cache and main memory: main memory is moved up a level and DRAM is used as a paging device. As the CPU-DRAM speed gap grows, it is expected ...
  • Olivier, MS (South African Computer Society (SAICSIT), 1997)
    Mobile computers pose special security risks since information contained on them can more easily be compromised. However, availability of information at the location where the mobile computer is to be used often outweighs ...
  • Calitz, AP; De Kock, G de V; Venter, DJL (South African Computer Society (SAICSIT), 1992)
    The evaluation of selection criteria for the admission of first year Computer Science students has been an ongoing project at the University of Port Elizabeth since 1984. Various selection criteria and methods, for example ...
  • Sparg, S.B.; Berman, Sonia (South African Computer Society (SAICSIT), 1992)
    Existing persistent languages cannot express the structure and semantics of the data they work on precisely and simply. As a result programs are more difficult to write and the integrity of the data is compromised. This ...
  • Li, F; Liu, Y; Lee, JY; Ahmad, I (South African Computer Society (SAICSIT), 1999)
    In this paper, we propose scheduling algorithms for call admission control servers. For each requested video, the server sends it according to its smoothed profile aims at maximizing resource utilization and ease of network ...
  • Lamprecht, SM (South African Computer Society (SAICSIT), 1993)
    Distributed database systems provide users with the facility to utilize and maintain information that is geographically dispersed in files at several sites while they remain unaware of the distribution of the information. ...

Search UnisaIR


Browse

My Account